Compromising the client Laptop or computer, which include by installing a malicious root certificate in to the system or browser trust retail outlet. An ethernet cable will allow the person to attach their equipment which include computers, cell phones, routers, etc, to a Local Area Network (LAN) that enables a http://XXX